Data Governance & Policy

💡 Learning Outcomes

  • Understand the principles of GDPR and lawful handling of personal/sensitive data
  • Recognise University of Nottingham policies on research ethics and data management
  • Apply data classification and information security tiers to research datasets
  • Identify key compliance frameworks and shared responsibilities in research projects

❓ Questions

  1. What are researchers’ responsibilities under GDPR and UK data protection law?
  2. When does a project require research ethics approval at UoN?
  3. How should datasets be classified to align with institutional information security policy?
  4. How do institutional and funder policies intersect to shape digital compliance?

Structure & Agenda

  1. Data Protection and Legal Frameworks (~15 min)
  2. Research Ethics and Institutional Conduct (~15 min)
  3. Data Classification and Information Security (~15 min)
  4. Policy and Digital Compliance Landscape (~15 min)

Institutional Conduct

Ethics

Ethical review ensures that research is conducted with integrity, transparency and respect. At the University of Nottingham, ethical standards are guided by the Code of Research Conduct and Research Ethics.

Core Ethical Principles

Principle Meaning
Respect Uphold autonomy, dignity and rights of participants
Integrity Ensure honesty and transparency in all research stages
Responsibility Prevent harm and manage potential risks
Accountability Maintain records and be answerable for decisions

🧭 Ethical practice is both a regulatory requirement and a marker of research quality.

Review Processes at UoN

  • Ethics approval required for any study involving humans, personal data, or safety risks
  • Proportionate review based on level of risk: School/Faculty REC or NHS REC
  • Some low-risk activities may be registered but not reviewed if fully anonymised

flowchart LR
    A[Research Idea] --> B[Ethics Self-Assessment]
    B --> C{Human Data or Participants?}
    C -->|No| D[Record Only]
    C -->|Yes| E[Ethics Application]
    E --> F{Low or High Risk?}
    F -->|Low| G[School/Faculty REC]
    F -->|High| H[NHS or Specialist REC]

Common Ethical Issues

  • Use of vulnerable populations (children, patients)
  • Power dynamics in interviews
  • Cultural and linguistic sensitivity
  • Secondary use of existing data
  • Data storage, retention and destruction

Building Ethics into Design

  • Embed ethical reflection from project inception
  • Draft consent materials in accessible language
  • Include withdrawal procedures and feedback mechanisms
  • Consider participant burden and researcher wellbeing

Task 2: Group Ethics Mapping (15 min)

Objective: Classify all data types in your scenario card using UoN’s Information Classification Framework and assign appropriate storage and access controls. Steps:

  1. Identify ethical issues inherent in your scenario (e.g., vulnerability, distress, clinical linkage, geolocation, minors).
  2. Decide whether the project requires ethical review and specify the likely route: School/Faculty REC? Specialist REC (i.e. NHS)
  3. Identify core documentation needed (consent materials, information sheets, risk assessments).
  4. Agree on key ethical considerations the research team must address before data collection.

Plenary reflection: Which factors most strongly affect whether review is needed? Where do grey areas appear?

Data Classification and Information Security

Handeling research data

Research data must be handled according to sensitivity and risk. UoN’s Information Classification Framework defines four tiers: Public, Internal, Confidential and Highly Confidential.

Information Classification Model

flowchart LR
    A[Public] --> B[Internal]
    B --> C[Confidential]
    C --> D[Highly Confidential]

Level Description Examples Storage Guidance
Public Freely shareable data Published results, open datasets Repositories, websites
Internal Limited to UoN community Teaching materials SharePoint, OneDrive
Confidential Sensitive but manageable risk Interview transcripts, research drafts Research drives
Highly Confidential High-risk personal or security data Clinical data, restricted partnerships Secure servers, encrypted access

Protecting Research Data

  • Apply classification labels consistently
  • Encrypt sensitive data in transit and at rest
  • Record and review data access permissions regularly

Managing Security Incidents

  • Report suspected breaches immediately to Digital Technology services and the data protection officer
  • Document actions taken and lessons learned
  • Implement follow-up audits if needed

Task 3: Group Data Classification (15 min)

Objective: Determine the information security requirements for the project described on your scenario card.

Instructions:

  1. List all data types present in the scenario (raw, processed, derived).
  2. Classify each as Public, Internal, Confidential, or Highly Confidential.
  3. Identify suitable storage locations (e.g., research drives, secure servers, encrypted environments).
  4. Define access control needs (minimum access, MFA, encryption, role-based permissions).
  5. Identify any components that require additional safeguards (e.g., separate linkage files, encryption in transit).

Plenary reflection: How do teams balance openness and risk? Which criteria most influenced your decisions?

Policy and Digital Compliance Landscape

Teired levels

Data governance operates across multiple levels: institutional, national and funder each setting standards for responsible research and compliance.

Institutional Policies

  • Code of Research Conduct and Research Ethics: defines ethical standards and oversight.
  • Code of Practice on Research Data Management: mandates DMPs, retention and repository use.
  • Information Security Policy: classification, storage and access control.
  • Trusted Research (UoN) due diligence for international collaboration.

National & Funder Frameworks

Framework Focus Examples
UKRI Trusted Research & Innovation Secure international collaboration Partnership risk assessments
UKRI Open Research Data Policy Sharing with safeguards FAIR data principles
Data Protection Act 2018 Legal controller obligations Research exemptions with safeguards
Export Controls Sharing restrictions Sensitive collaborations

Implementing Compliance in Projects

flowchart LR
    A[Institutional Policy] --> B[Funder Requirements]
    B --> C[Project-Level Implementation]
    C --> D[Monitoring & Review]
    D --> A

Essential Compliance Documents

Modern research governance relies on a set of standard documents that ensure transparency, accountability and risk-aware data management throughout the project lifecycle.

Key Documents

Document Purpose When Required
DPIA – Data Protection Impact Assessment Identifies and mitigates high-risk processing (e.g., special category data, monitoring, novel tech). Mandatory for any high-risk activity under UK GDPR; often required for clinical, AI-enabled or large-scale personal data studies.
DAR – Data Access Request / Data Access Review Records, evaluates and approves requests to access sensitive or controlled datasets; ensures proportionality and security. When researchers need access to restricted, confidential or external datasets.
DMP – Data Management Plan Specifies how data will be collected, stored, secured, shared, preserved and disposed of. Required by UoN, UKRI and most funders; drafted at proposal stage and updated throughout the project.
Data Sharing / Collaboration Agreements (DSA / DCA) Define roles (controller/processor), safeguards and transfer conditions. When sharing data with external partners, processors or internationally.
Participant Information & Consent Materials Provide transparency and ensure voluntary, informed participation. Required whenever collecting personal data directly from participants.
Risk Assessments (Information Security, Fieldwork, Technical) Document digital, physical and technical risks and their controls. Required for projects involving sensitive data, fieldwork or specialised systems.

Why These Documents Matter

  • Support accountability and demonstrable compliance
  • Protect privacy, security, and ethical integrity
  • Provide a clear audit trail
  • Enable effective collaboration with Ethics, DPO, IT Security, and external partners

🗂️ Good documentation is the backbone of trustworthy research and strong data governance.

Shared Responsibility Matrix

Actor Responsibility
Researcher Follow ethical and legal guidelines
PI Ensure compliance and oversight
Faculty / REC Review and approve projects
DPO / Legal Provide advice, investigate breaches
Funders Define standards and expectations

Embedding Compliance in Teams

  • Schedule compliance check-ins during project meetings
  • Store key documents (DMP, REC approvals) in shared folders
  • Ensure all collaborators understand relevant obligations
  • Keep version-controlled audit trails

🌍 Compliance works best when embedded in daily workflows, not treated as an afterthought.


Task 4: Group Policy Mapping (15 min)

Objective: Map your scenario card to relevant institutional, funder and legal policies and identify responsibilities across the project team.

Instructions:

  1. Review the scenario for elements such as third-party processing, international data flows, clinical data, special category data, open publication, or high-risk technology use.
  2. Match your scenario to applicable policies (e.g., RDM Code, Information Security Policy, Code of Research Conduct, Trusted Research, UKRI requirements).
  3. Identify which team members hold responsibility for compliance actions (Researcher, PI, Faculty REC, DPO, IT Security, external partners).
  4. Summarise key compliance actions required before the project can proceed (e.g., DPIA, DMP, agreements, export controls checks).

Plenary reflection: Which policy areas overlap most frequently across scenarios?

Further Information


📚 Keypoints

  • GDPR defines lawful bases and safeguards for personal data.
  • Ethical review ensures responsible and transparent research.
  • Data classification determines secure storage and access.
  • Compliance integrates institutional, funder and legal responsibilities.

🔦 Hints

  • Consult the Research Ethics & Integrity team or Data Protection Officer early.
  • Incorporate compliance into project design, not post-hoc review.
  • Keep records in DMPs and ethics applications.
  • International collaboration may trigger Trusted Research checks.